International Journal of Information and Computer Security (IJICS)

International Journal of Information and Computer Security

2020 Vol.13 No.3/4


Pages Title and author(s)
249-267CFM: collusion-free model of privacy preserving frequent itemset mining
Yoones A. Sekhavat
DOI: 10.1504/IJICS.2020.109476
268-288Towards automated SCADA forensic investigation: challenges, opportunities and promising paradigms
Mohamed Elhoseny; Hosny Abbas
DOI: 10.1504/IJICS.2020.109477
289-308Fast causal division for supporting robust causal discovery
Guizhen Mai; Shuiguo Peng; Yinghan Hong; Pinghua Chen
DOI: 10.1504/IJICS.2020.109478
309-321System for DDoS attack mitigation by discovering the attack vectors through statistical traffic analysis
Mircho Jordanov Mirchev; Seferin Todorov Mirtchev
DOI: 10.1504/IJICS.2020.109479
322-336HHDSSC: harnessing healthcare data security in cloud using ciphertext policy attribute-based encryption
Dharavath Ramesh; Rashmi Priya Sharma; Damodar Reddy Edla
DOI: 10.1504/IJICS.2020.109480
337-356A categorical survey of state-of-the-art intrusion detection system-Snort
Alka Gupta; Lalit Sen Sharma
DOI: 10.1504/IJICS.2020.109481
357-371A lightweight fully homomorphic encryption scheme for cloud security
V. Biksham; D. Vasumathi
DOI: 10.1504/IJICS.2020.109482
372-395Fuzzy ARM and cluster analysis for database intrusion detection and prevention
Indu Singh; Nikhil Arora; Shivam Arora; Parteek Singhal
DOI: 10.1504/IJICS.2020.109483
396-410Data encoding and cost optimised distribution for efficient and secure storage in cloud federation
Sonika Shrivastava; R.K. Pateriya
DOI: 10.1504/IJICS.2020.109484
411-427Comparative study of classification approaches for e-mail analysis
Pranjal S. Bogawar; K.K. Bhoyar
DOI: 10.1504/IJICS.2020.109485
428-443Intruder model for generating attack scenarios in computer systems
Lamia Hamza
DOI: 10.1504/IJICS.2020.109486